IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
 
Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Transitioning Enterprise Customers to the Cloud in a Secure Environment
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how service providers can deliver a secure cloud access service without sacrificing the user experience customers have come to expect.
Posted: 09 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

The Importance of Mobile Infrastructure
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: Access this expert eGuide and learn why IT shops must invest in modern infrastructures to meet the growing demands of mobility in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and IntelĀ®

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Government -OpenLegacy replaces old HTML emulation solution at the Israel Airport Authority with a modern web application
sponsored by Open Legacy
WHITE PAPER: Access this white paper to find out how IAA's engineers developed a dedicated mobile application to handle all aspects of security personnel management, including shift planning and assignment.
Posted: 29 May 2015 | Published: 31 Jan 2015

Open Legacy

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

Meeting PCI and ISO Compliance Checklist
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides a checklist for meeting PCI and ISO compliance. Access now and discover what it takes to keep the cyber criminals at bay when it comes to your client's credit card information.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Download and discover how hackers are using app sideloading to take advantage of your enterprise provisioning, and learn how you can manage the emerging security threats.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement